Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe
-
Size
324KB
-
MD5
577eb73a920cabf4752bc0d259a18716
-
SHA1
a107331c4620696f213e71e64cbdb55cf985ccd5
-
SHA256
9fe67e38c16b74daf65a98c733292929c9cc87764335af3b0f46119b3a9b3b67
-
SHA512
bca56f39128f31f787e494742dcb023d4d9cb9624c9b8cd1052f1f84df67241c643e19945f2090fb236ef333c704709b129d6224c7a0d597066efa9f9aaafce6
-
SSDEEP
6144:kHcsjhIW4YW6shNlA9ceJ3jzw6QjRp8Jmq2a:OohL8cWHfQjP8
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe:*:enabled:@shell32.dll,-1" JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe:*:Enabled:ipsec" JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
resource yara_rule behavioral2/memory/5016-9-0x0000000002E60000-0x0000000003E90000-memory.dmp upx behavioral2/memory/5016-11-0x0000000002E60000-0x0000000003E90000-memory.dmp upx behavioral2/memory/5016-18-0x0000000002E60000-0x0000000003E90000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe File created C:\Windows\Fonts\smss.exe JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe File opened for modification C:\Windows\Fonts\smss.exe JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3300 5016 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe Token: SeDebugPrivilege 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 616 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5 PID 5016 wrote to memory of 616 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5 PID 5016 wrote to memory of 616 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5 PID 5016 wrote to memory of 616 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5 PID 5016 wrote to memory of 616 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5 PID 5016 wrote to memory of 616 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 5 PID 5016 wrote to memory of 668 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 7 PID 5016 wrote to memory of 668 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 7 PID 5016 wrote to memory of 668 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 7 PID 5016 wrote to memory of 668 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 7 PID 5016 wrote to memory of 668 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 7 PID 5016 wrote to memory of 668 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 7 PID 5016 wrote to memory of 788 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 8 PID 5016 wrote to memory of 788 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 8 PID 5016 wrote to memory of 788 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 8 PID 5016 wrote to memory of 788 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 8 PID 5016 wrote to memory of 788 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 8 PID 5016 wrote to memory of 788 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 8 PID 5016 wrote to memory of 796 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 9 PID 5016 wrote to memory of 796 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 9 PID 5016 wrote to memory of 796 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 9 PID 5016 wrote to memory of 796 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 9 PID 5016 wrote to memory of 796 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 9 PID 5016 wrote to memory of 796 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 9 PID 5016 wrote to memory of 804 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 10 PID 5016 wrote to memory of 804 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 10 PID 5016 wrote to memory of 804 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 10 PID 5016 wrote to memory of 804 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 10 PID 5016 wrote to memory of 804 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 10 PID 5016 wrote to memory of 804 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 10 PID 5016 wrote to memory of 904 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 11 PID 5016 wrote to memory of 904 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 11 PID 5016 wrote to memory of 904 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 11 PID 5016 wrote to memory of 904 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 11 PID 5016 wrote to memory of 904 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 11 PID 5016 wrote to memory of 904 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 11 PID 5016 wrote to memory of 956 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 12 PID 5016 wrote to memory of 956 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 12 PID 5016 wrote to memory of 956 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 12 PID 5016 wrote to memory of 956 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 12 PID 5016 wrote to memory of 956 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 12 PID 5016 wrote to memory of 956 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 12 PID 5016 wrote to memory of 64 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 13 PID 5016 wrote to memory of 64 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 13 PID 5016 wrote to memory of 64 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 13 PID 5016 wrote to memory of 64 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 13 PID 5016 wrote to memory of 64 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 13 PID 5016 wrote to memory of 64 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 13 PID 5016 wrote to memory of 716 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 14 PID 5016 wrote to memory of 716 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 14 PID 5016 wrote to memory of 716 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 14 PID 5016 wrote to memory of 716 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 14 PID 5016 wrote to memory of 716 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 14 PID 5016 wrote to memory of 716 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 14 PID 5016 wrote to memory of 920 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 15 PID 5016 wrote to memory of 920 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 15 PID 5016 wrote to memory of 920 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 15 PID 5016 wrote to memory of 920 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 15 PID 5016 wrote to memory of 920 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 15 PID 5016 wrote to memory of 920 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 15 PID 5016 wrote to memory of 952 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 16 PID 5016 wrote to memory of 952 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 16 PID 5016 wrote to memory of 952 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 16 PID 5016 wrote to memory of 952 5016 JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe 16 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:804
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3196
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3820
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3920
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3980
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4064
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2132
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:5116
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4032
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:1064
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:3328
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:4904
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2580
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1124
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2628
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:3320
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1284
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2472
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1612
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1684
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1756
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2020
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1532
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2912
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2936
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3340
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_577eb73a920cabf4752bc0d259a18716.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Disables RegEdit via registry modification
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 10123⤵
- Program crash
PID:3300
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5060
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1500
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2096
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:2204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5016 -ip 50161⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD5577eb73a920cabf4752bc0d259a18716
SHA1a107331c4620696f213e71e64cbdb55cf985ccd5
SHA2569fe67e38c16b74daf65a98c733292929c9cc87764335af3b0f46119b3a9b3b67
SHA512bca56f39128f31f787e494742dcb023d4d9cb9624c9b8cd1052f1f84df67241c643e19945f2090fb236ef333c704709b129d6224c7a0d597066efa9f9aaafce6